Огляд Елементів

Ознайомтеся з нашою колекцією елементів

стаття Стаття
Comparative analysis of modern cryptographic ciphers and the AES algorithm

Comparative analysis of modern cryptographic ciphers and the AES algorithm

2026/03/25 1
3267-Текст статті-4465-1-2-20240223 Стаття
Organization of information protection at the «Drive Petrol» enterprise using a cryptographic algorithm AES

In today's digital age, information protection is becoming a dominant task, as the number of thre...

2024/02/27 1
2965-Текст статті-4091-1-2-20230811 Стаття
Enhanced authorization for secure management of sensitive data in hybrid applications

Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers...

2023/10/23 1
document-84-90 Стаття
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet e...

2023/06/26 1
Головко_походун Стаття
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and dat...

2023/02/10 1
Головко_СУНЗ_2021 Стаття
Data encryption using XOR cipher

This article offers an example of using an application whose main task is to encrypt data such as...

2021/06/11 1
Organization of information protection at the «Drive Petrol» enterprise using a cryptographic algorithm AES

In today's digital age, information protection is becoming a dominant task, as the number of threats in the field of cyber security is constantly increasing. In this context, the implementation of ...

Стаття 2024/02/27
1
Enhanced authorization for secure management of sensitive data in hybrid applications

Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers who seek unauthorized access to this data. Traditional approaches to authorization may not be suffi...

Стаття 2023/10/23
1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...

Стаття 2023/06/26
1
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptog...

Стаття 2023/02/10
1
Data encryption using XOR cipher

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The X...

Стаття 2021/06/11
1